Prerequisites

Duration

0 Days

Audience

Anyone using a Kubernetes Cluster

Topics

By the end of the course, you should be able to meet the following objectives: • Understand the security model of Kubernetes • Understand the various Authentication mechanism in Kubernetes • Use RBAC policies to control access to clusters • Enable and view audit logging • Use Pod Security Policies to restrict what elevated privileges pods can request • Use Network Policies to restrict network access between pods in a cluster